Penetration Testing mailing list archives
Re: Wireless Audit Reports
From: steven () lovebug org
Date: Thu, 30 Mar 2006 19:24:01 -0800 (PST)
Hello, I have been reading all of these replies and would just like to throw in a little bit more. Someone mentioned that a person could setup another AP to lure in people from your network. This is definitely a potential risk as they can do this in a few ways. They could just stand up their AP with their own SSID and hope for someone else to connect and attempt to compromise their machine, sniff traffic, and/or conduct MITM attacks. They could also do the same thing by cloning the name of your network's SSID. I am not sure how many APs your environment has, but it might be worth documenting all of the instances of the valid SSID and the associated MAC addresses. If you are going by SSID alone it is possible that there is a fake AP they showed up and it could be overlooked. Documenting the MAC addresses, channel, location, IP address, etc of your APs and looking for any anomalies might be good too. If you are going to be doing consistent reports you can always refer to your previously collected information. Also, as I am sure you have know and has been referenced in another post -- your report is only as accurate as the time period for which your audit was conducted. Ad-hoc networks, rogue APs can be plugged in an unplugged at any moment. Unless you have something like AirDefense or a WLSE -- you need to frequently check to be sure you are consistently free of these things. Ad-hoc (peer-to-peer) networks are frequently overlooked and area decent risk, especially if your machines aren't fully patched. If you want to have a full and comprehensive report, make sure you are looking at 802.11a/b/g. Anyway -- I hope that helps. Btw.. what "tools" are you using now? Steven
Hi, I work in an environment that has a policy that does not permit wireless devices. We still do an "audit" of the area to ensure that there are no wireless devices in our area. I wish to prove that there are no devices. Being in a city, there are literally hundreds of wireless networks present - perhaps up to 50 in any one given area of our building. I have tracked the signals down and have determined that there are no rogue access points or peer networks hidden in our portion of the building. Now a traditional wireless audit would be easy. I could report the signal strengths of our devices, if the SSID's are correct, are non-broadcast, etc. That would be an easy report to create after data collection. In this case, I am trying to prove a negative. I can list networks, signal strengths, etc. but I feel like I am fluffing the report with meaningless and time wasting statistics. Does anyone have any experience in what they would report under these circumstances? Matt ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
Current thread:
- Wireless Audit Reports Matthew Webster (Mar 29)
- Re: Wireless Audit Reports David M. Zendzian (Mar 30)
- Re: Wireless Audit Reports Kyle Maxwell (Mar 30)
- Re: Wireless Audit Reports Maudite MLRL (Mar 30)
- Re: Wireless Audit Reports steven (Mar 31)
- <Possible follow-ups>
- Re: Wireless Audit Reports Matthew Webster (Mar 30)
- RE: Wireless Audit Reports Michael Scheidell (Mar 30)
- Re: Wireless Audit Reports Matthew Webster (Mar 30)
- RE: Wireless Audit Reports Jeff Gercken (Mar 30)
- tcpdump reconstructor Ghirai (Mar 31)
- Re: tcpdump reconstructor Andres Riancho (Mar 31)
- Re: tcpdump reconstructor Jason (Mar 31)
- Re: tcpdump reconstructor Nikhil Mulley (Mar 31)
- tcpdump reconstructor Ghirai (Mar 31)
- RE: Wireless Audit Reports Hayes, Ian (Mar 30)
- RE: Wireless Audit Reports Shenk, Jerry A (Mar 31)